Figure 2
Figure 2: In the second step of the installation, you enable authentication with the email domain.
Figure 2: In the second step of the installation, you enable authentication with the email domain.